STETSKO, Andriy, Tobiáš SMOLKA, Filip JURNEČKA and Václav MATYÁŠ. On the Credibility of Wireless Sensor Network Simulations: Evaluation of Intrusion Detection System. Online. In SIMUTOOLS '12: Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques. Belgium: ICST, 2012, p. 75-84. ISBN 978-1-4503-1510-4.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name On the Credibility of Wireless Sensor Network Simulations: Evaluation of Intrusion Detection System
Authors STETSKO, Andriy (804 Ukraine, guarantor, belonging to the institution), Tobiáš SMOLKA (703 Slovakia, belonging to the institution), Filip JURNEČKA (203 Czech Republic, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, belonging to the institution).
Edition Belgium, SIMUTOOLS '12: Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques, p. 75-84, 10 pp. 2012.
Publisher ICST
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Belgium
Confidentiality degree is not subject to a state or trade secret
Publication form electronic version available online
RIV identification code RIV/00216224:14330/12:00057321
Organization unit Faculty of Informatics
ISBN 978-1-4503-1510-4
Keywords in English Intrusion detection;Castalia;Cooja;comparison;evaluation;MiXiM;simulator;wireless sensor network;WSNet
Tags best
Tags International impact, Reviewed
Changed by Changed by: RNDr. Andrij Stecko, Ph.D., učo 184905. Changed: 1/4/2013 10:16.
Abstract
In the field of wireless sensor networks, not many schemes are tested on real hardware. System designers usually give preference to simulations since their preparation and execution require significantly less time and money than experiments on real hardware. In this paper, we present a practical research on four open-source simulators, i.e., Castalia, Cooja, MiXiM and WSNet. Recently, using a simple test case, we demonstrated that usage of different simulators results into different evaluation outcomes even though the simulators are set in the same way, and the same evaluation metric is used - a number of packets received by sensor nodes. We hypothesized possible sources of the differences, but we did not thoroughly examine them. In this paper, we rigorously examine the simulators and present our findings regarding the sources of the differences. Also, we evaluate their impact on the evaluation of a more complex system - the intrusion detection system.
Links
GAP202/11/0422, research and development projectName: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation
PrintDisplayed: 2/5/2024 00:59